id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2501.02208 | Robust Multi-Dimensional Scaling via Accelerated Alternating Projections | We consider the robust multi-dimensional scaling (RMDS) problem in this paper. The goal is to localize point locations from pairwise distances that may be corrupted by outliers. Inspired by classic MDS theories, and nonconvex works for the robust principal component analysis (RPCA) problem, we propose an alternating pr... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 522,398 |
2408.02904 | Enabling Intelligent Traffic Systems: A Deep Learning Method for
Accurate Arabic License Plate Recognition | This paper introduces a novel two-stage framework for accurate Egyptian Vehicle License Plate Recognition (EVLPR). The first stage employs image processing techniques to reliably localize license plates, while the second stage utilizes a custom-designed deep learning model for robust Arabic character recognition. The p... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 478,810 |
2406.15540 | Specify What? Enhancing Neural Specification Synthesis by Symbolic
Methods | We investigate how combinations of Large Language Models (LLMs) and symbolic analyses can be used to synthesise specifications of C programs. The LLM prompts are augmented with outputs from two formal methods tools in the Frama-C ecosystem, Pathcrawler and EVA, to produce C program annotations in the specification lang... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 466,772 |
2403.00520 | IAI MovieBot 2.0: An Enhanced Research Platform with Trainable Neural
Components and Transparent User Modeling | While interest in conversational recommender systems has been on the rise, operational systems suitable for serving as research platforms for comprehensive studies are currently lacking. This paper introduces an enhanced version of the IAI MovieBot conversational movie recommender system, aiming to evolve it into a rob... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 434,008 |
2111.04473 | Senatus -- A Fast and Accurate Code-to-Code Recommendation Engine | Machine learning on source code (MLOnCode) is a popular research field that has been driven by the availability of large-scale code repositories and the development of powerful probabilistic and deep learning models for mining source code. Code-to-code recommendation is a task in MLOnCode that aims to recommend relevan... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 265,494 |
2006.10628 | Offline detection of change-points in the mean for stationary graph
signals | This paper addresses the problem of segmenting a stream of graph signals: we aim to detect changes in the mean of a multivariate signal defined over the nodes of a known graph. We propose an offline method that relies on the concept of graph signal stationarity and allows the convenient translation of the problem from ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 182,951 |
2502.12929 | Flow-of-Options: Diversified and Improved LLM Reasoning by Thinking
Through Options | We present a novel reasoning approach called Flow-of-Options (FoO), designed to address intrinsic biases in Large Language Models (LLMs). FoO enables LLMs to systematically explore a diverse range of possibilities in their reasoning, as demonstrated by an FoO-based agentic system for autonomously solving Machine Learni... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 535,117 |
2006.11835 | An Overview on the Landscape of R Packages for Credit Scoring | The credit scoring industry has a long tradition of using statistical tools for loan default probability prediction and domain specific standards have been established long before the hype of machine learning. Although several commercial software companies offer specific solutions for credit scorecard modelling in R ex... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 183,387 |
2010.10059 | Very Fast Streaming Submodular Function Maximization | Data summarization has become a valuable tool in understanding even terabytes of data. Due to their compelling theoretical properties, submodular functions have been in the focus of summarization algorithms. These algorithms offer worst-case approximations guarantees to the expense of higher computation and memory requ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 201,774 |
2409.15261 | Identification and Localization of Cometary Activity in Solar System
Objects with Machine Learning | In this chapter, we will discuss the use of Machine Learning methods for the identification and localization of cometary activity for Solar System objects in ground and in space-based wide-field all-sky surveys. We will begin the chapter by discussing the challenges of identifying known and unknown active, extended Sol... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 490,826 |
1508.07192 | Varying-coefficient models with isotropic Gaussian process priors | We study learning problems in which the conditional distribution of the output given the input varies as a function of additional task variables. In varying-coefficient models with Gaussian process priors, a Gaussian process generates the functional relationship between the task variables and the parameters of this con... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 46,385 |
2007.07595 | Non-Relational Databases on FPGAs: Survey, Design Decisions, Challenges | Non-relational database systems (NRDS), such as graph, document, key-value, and wide-column, have gained much attention in various trending (business) application domains like smart logistics, social network analysis, and medical applications, due to their data model variety and scalability. The broad data variety and ... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | true | 187,382 |
2202.11864 | Some Stylometric Remarks on Ovid's Heroides and the Epistula Sapphus | This article aims to contribute to two well-worn areas of debate in classical Latin philology, relating to Ovid's Heroides. The first is the question of the authenticity (and, to a lesser extent the correct position) of the letter placed fifteenth by almost every editor -- the so-called Epistula Sapphus (henceforth ES)... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 282,026 |
1712.09473 | Sketching for Kronecker Product Regression and P-splines | TensorSketch is an oblivious linear sketch introduced in Pagh'13 and later used in Pham, Pagh'13 in the context of SVMs for polynomial kernels. It was shown in Avron, Nguyen, Woodruff'14 that TensorSketch provides a subspace embedding, and therefore can be used for canonical correlation analysis, low rank approximation... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 87,360 |
1509.08465 | How Many Political Parties Should Brazil Have? A Data-driven Method to
Assess and Reduce Fragmentation in Multi-Party Political Systems | In June 2013, Brazil faced the largest and most significant mass protests in a generation. These were exacerbated by the population's disenchantment towards its highly fragmented party system, which is composed by a very large number of political parties. Under these circumstances, presidents are constrained by informa... | false | false | false | true | false | false | false | false | false | false | false | false | false | true | true | false | false | false | 47,375 |
2312.04346 | Detection and Imputation based Two-Stage Denoising Diffusion Power
System Measurement Recovery under Cyber-Physical Uncertainties | Power system cyber-physical uncertainties, including measurement ambiguities stemming from cyber attacks and data losses, along with system uncertainties introduced by massive renewables and complex dynamics, reduce the likelihood of enhancing the quality of measurements. Fortunately, denoising diffusion models exhibit... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 413,646 |
2207.13843 | Deep Learning-Based Acoustic Mosquito Detection in Noisy Conditions
Using Trainable Kernels and Augmentations | In this paper, we demonstrate a unique recipe to enhance the effectiveness of audio machine learning approaches by fusing pre-processing techniques into a deep learning model. Our solution accelerates training and inference performance by optimizing hyper-parameters through training instead of costly random searches to... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 310,418 |
2010.05698 | Deep Autoencoder based Energy Method for the Bending, Vibration, and
Buckling Analysis of Kirchhoff Plates | In this paper, we present a deep autoencoder based energy method (DAEM) for the bending, vibration and buckling analysis of Kirchhoff plates. The DAEM exploits the higher order continuity of the DAEM and integrates a deep autoencoder and the minimum total potential principle in one framework yielding an unsupervised fe... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 200,230 |
2411.11536 | Hierarchical-Graph-Structured Edge Partition Models for Learning
Evolving Community Structure | We propose a novel dynamic network model to capture evolving latent communities within temporal networks. To achieve this, we decompose each observed dynamic edge between vertices using a Poisson-gamma edge partition model, assigning each vertex to one or more latent communities through \emph{nonnegative} vertex-commun... | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 509,092 |
1201.2483 | Duality of Channel Encoding and Decoding - Part I: Rate-1 Binary
Convolutional Codes | In this paper, we revisit the forward, backward and bidirectional Bahl-Cocke-Jelinek-Raviv (BCJR) soft-input soft-output (SISO) maximum a posteriori probability (MAP) decoding process of rate-1 binary convolutional codes. From this we establish some interesting explicit relationships between encoding and decoding of ra... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 13,781 |
1707.04987 | Online Multi-Armed Bandit | We introduce a novel variant of the multi-armed bandit problem, in which bandits are streamed one at a time to the player, and at each point, the player can either choose to pull the current bandit or move on to the next bandit. Once a player has moved on from a bandit, they may never visit it again, which is a crucial... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 77,143 |
2201.11374 | Systematic Investigation of Strategies Tailored for Low-Resource
Settings for Low-Resource Dependency Parsing | In this work, we focus on low-resource dependency parsing for multiple languages. Several strategies are tailored to enhance performance in low-resource scenarios. While these are well-known to the community, it is not trivial to select the best-performing combination of these strategies for a low-resource language tha... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 277,280 |
1701.02468 | Unite the People: Closing the Loop Between 3D and 2D Human
Representations | 3D models provide a common ground for different representations of human bodies. In turn, robust 2D estimation has proven to be a powerful tool to obtain 3D fits "in-the- wild". However, depending on the level of detail, it can be hard to impossible to acquire labeled data for training 2D estimators on large scale. We ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 66,555 |
2408.13966 | Reducing the Cost: Cross-Prompt Pre-Finetuning for Short Answer Scoring | Automated Short Answer Scoring (SAS) is the task of automatically scoring a given input to a prompt based on rubrics and reference answers. Although SAS is useful in real-world applications, both rubrics and reference answers differ between prompts, thus requiring a need to acquire new data and train a model for each n... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 483,365 |
1107.1600 | On fuzzy syndrome hashing with LDPC coding | The last decades have seen a growing interest in hash functions that allow some sort of tolerance, e.g. for the purpose of biometric authentication. Among these, the syndrome fuzzy hashing construction allows to securely store biometric data and to perform user authentication without the need of sharing any secret key.... | false | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | 11,201 |
2302.02592 | RLTP: Reinforcement Learning to Pace for Delayed Impression Modeling in
Preloaded Ads | To increase brand awareness, many advertisers conclude contracts with advertising platforms to purchase traffic and then deliver advertisements to target audiences. In a whole delivery period, advertisers usually desire a certain impression count for the ads, and they also expect that the delivery performance is as goo... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 344,055 |
2105.14156 | SMASH: Sparse Matrix Atomic Scratchpad Hashing | Sparse matrices, more specifically SpGEMM kernels, are commonly found in a wide range of applications, spanning graph-based path-finding to machine learning algorithms (e.g., neural networks). A particular challenge in implementing SpGEMM kernels has been the pressure placed on DRAM memory. One approach to tackle this ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 237,551 |
2409.18402 | Embed and Emulate: Contrastive representations for simulation-based
inference | Scientific modeling and engineering applications rely heavily on parameter estimation methods to fit physical models and calibrate numerical simulations using real-world measurements. In the absence of analytic statistical models with tractable likelihoods, modern simulation-based inference (SBI) methods first use a nu... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 492,238 |
2411.19058 | Quality Time: Carbon-Aware Quality Adaptation for Energy-Intensive
Services | The energy demand of modern cloud services, particularly those related to generative AI, is increasing at an unprecedented pace. While hyperscalers collectively fail to meet their self-imposed emission reduction targets, they face increasing pressure from environmental sustainability reporting across many jurisdictions... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | true | 512,104 |
2501.11264 | Code Readability in the Age of Large Language Models: An Industrial Case
Study from Atlassian | Programmers spend a significant amount of time reading code during the software development process. This trend is amplified by the emergence of large language models (LLMs) that automatically generate code. However, little is known about the readability of the LLM-generated code and whether it is still important from ... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | true | 525,858 |
2106.13507 | Pilot Contamination Elimination for Channel Estimation with Complete
Knowledge of Large-Scale Fading in Downlink Massive MIMO Systems | Massive multiple-input multiple-output is a very important technology for future fifth-generation systems. However, massive massive multiple input multiple output systems are still limited because of pilot contamination, impacting the data rate due to the non-orthogonality of pilot sequences transmitted by users in the... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 243,097 |
2308.00918 | A Novel Cross-Perturbation for Single Domain Generalization | Single domain generalization aims to enhance the ability of the model to generalize to unknown domains when trained on a single source domain. However, the limited diversity in the training data hampers the learning of domain-invariant features, resulting in compromised generalization performance. To address this, data... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 383,073 |
cs/0510063 | Markerless Human Motion Capture for Gait Analysis | The aim of our study is to detect balance disorders and a tendency towards the falls in the elderly, knowing gait parameters. In this paper we present a new tool for gait analysis based on markerless human motion capture, from camera feeds. The system introduced here, recovers the 3D positions of several key points of ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 539,031 |
1703.07807 | Learning to Partition using Score Based Compatibilities | We study the problem of learning to partition users into groups, where one must learn the compatibilities between the users to achieve optimal groupings. We define four natural objectives that optimize for average and worst case compatibilities and propose new algorithms for adaptively learning optimal groupings. When ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 70,456 |
1802.05730 | Pedestrian-Robot Interaction Experiments in an Exit Corridor | The study of human-robot interaction (HRI) has received increasing research attention for robot navigation in pedestrian crowds. In this paper, we present empirical study of pedestrian-robot interaction in an uni-directional exit corridor. We deploy a mobile robot moving in a direction perpendicular to that of the pede... | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | 90,489 |
1905.04280 | A Capacity-achieving One-message Key Agreement With Finite Blocklength
Analysis | Information-theoretic secret key agreement (SKA) protocols are a fundamental cryptographic primitive that are used to establish a shared secret key between two or more parties. In a two-party SKA in source model, Alice and Bob have samples of two correlated variables, that are partially leaked to Eve, and their goal is... | false | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | 130,420 |
1801.09665 | Cooperative repair: Constructions of optimal MDS codes for all
admissible parameters | Two widely studied models of multiple-node repair in distributed storage systems are centralized repair and cooperative repair. The centralized model assumes that all the failed nodes are recreated in one location, while the cooperative one stipulates that the failed nodes may communicate but are distinct, and the amou... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 89,154 |
2007.12946 | Duluth at SemEval-2020 Task 12: Offensive Tweet Identification in
English with Logistic Regression | This paper describes the Duluth systems that participated in SemEval--2020 Task 12, Multilingual Offensive Language Identification in Social Media (OffensEval--2020). We participated in the three English language tasks. Our systems provide a simple Machine Learning baseline using logistic regression. We trained our mod... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 188,976 |
1305.0556 | A quantum teleportation inspired algorithm produces sentence meaning
from word meaning and grammatical structure | We discuss an algorithm which produces the meaning of a sentence given meanings of its words, and its resemblance to quantum teleportation. In fact, this protocol was the main source of inspiration for this algorithm which has many applications in the area of Natural Language Processing. | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 24,359 |
2110.14148 | Uniform Concentration Bounds toward a Unified Framework for Robust
Clustering | Recent advances in center-based clustering continue to improve upon the drawbacks of Lloyd's celebrated $k$-means algorithm over $60$ years after its introduction. Various methods seek to address poor local minima, sensitivity to outliers, and data that are not well-suited to Euclidean measures of fit, but many are sup... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 263,430 |
1211.2037 | Time Complexity Analysis of Binary Space Partitioning Scheme for Image
Compression | Segmentation-based image coding methods provide high compression ratios when compared with traditional image coding approaches like the transform and sub band coding for low bit-rate compression applications. In this paper, a segmentation-based image coding method, namely the Binary Space Partition scheme, that divides... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 19,644 |
1205.6544 | A Brief Summary of Dictionary Learning Based Approach for Classification
(revised) | This note presents some representative methods which are based on dictionary learning (DL) for classification. We do not review the sophisticated methods or frameworks that involve DL for classification, such as online DL and spatial pyramid matching (SPM), but rather, we concentrate on the direct DL-based classificati... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 16,229 |
cs/0603025 | Open Answer Set Programming with Guarded Programs | Open answer set programming (OASP) is an extension of answer set programming where one may ground a program with an arbitrary superset of the program's constants. We define a fixed point logic (FPL) extension of Clark's completion such that open answer sets correspond to models of FPL formulas and identify a syntactic ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 539,314 |
2103.04116 | A novel approach to the classification of terrestrial drainage networks
based on deep learning and preliminary results on Solar System bodies | Several approaches were proposed to describe the geomorphology of drainage networks and the abiotic/biotic factors determining their morphology. There is an intrinsic complexity of the explicit qualification of the morphological variations in response to various types of control factors and the difficulty of expressing... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 223,529 |
2201.04494 | SensatUrban: Learning Semantics from Urban-Scale Photogrammetric Point
Clouds | With the recent availability and affordability of commercial depth sensors and 3D scanners, an increasing number of 3D (i.e., RGBD, point cloud) datasets have been publicized to facilitate research in 3D computer vision. However, existing datasets either cover relatively small areas or have limited semantic annotations... | false | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | 275,121 |
2110.08598 | A Variational Bayesian Approach to Learning Latent Variables for
Acoustic Knowledge Transfer | We propose a variational Bayesian (VB) approach to learning distributions of latent variables in deep neural network (DNN) models for cross-domain knowledge transfer, to address acoustic mismatches between training and testing conditions. Instead of carrying out point estimation in conventional maximum a posteriori est... | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | true | false | false | 261,477 |
2502.12894 | CAST: Component-Aligned 3D Scene Reconstruction from an RGB Image | Recovering high-quality 3D scenes from a single RGB image is a challenging task in computer graphics. Current methods often struggle with domain-specific limitations or low-quality object generation. To address these, we propose CAST (Component-Aligned 3D Scene Reconstruction from a Single RGB Image), a novel method fo... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 535,094 |
2303.00031 | Tiny Classifier Circuits: Evolving Accelerators for Tabular Data | A typical machine learning (ML) development cycle for edge computing is to maximise the performance during model training and then minimise the memory/area footprint of the trained model for deployment on edge devices targeting CPUs, GPUs, microcontrollers, or custom hardware accelerators. This paper proposes a methodo... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 348,462 |
1707.07151 | Optimal Transmit Beamforming for Secure SWIPT in Heterogeneous Networks | This letter investigates the artificial noise aided beamforming design for secure simultaneous wireless information and power transfer (SWIPT) in a two-tier downlink heterogeneous network, where one femtocell is overlaid with one macrocell in co-channel deployment. Each energy receiver (ER) in femtocell can be consider... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 77,558 |
2303.06705 | Retinexformer: One-stage Retinex-based Transformer for Low-light Image
Enhancement | When enhancing low-light images, many deep learning algorithms are based on the Retinex theory. However, the Retinex model does not consider the corruptions hidden in the dark or introduced by the light-up process. Besides, these methods usually require a tedious multi-stage training pipeline and rely on convolutional ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 350,960 |
2201.04733 | Adversarially Robust Classification by Conditional Generative Model
Inversion | Most adversarial attack defense methods rely on obfuscating gradients. These methods are successful in defending against gradient-based attacks; however, they are easily circumvented by attacks which either do not use the gradient or by attacks which approximate and use the corrected gradient. Defenses that do not obfu... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 275,174 |
2011.03182 | 5G Embraces Satellites for 6G Ubiquitous IoT: Basic Models for
Integrated Satellite Terrestrial Networks | Terrestrial communication networks mainly focus on users in urban areas but have poor coverage performance in harsh environments, such as mountains, deserts, and oceans. Satellites can be exploited to extend the coverage of terrestrial fifth-generation (5G) networks. However, satellites are restricted by their high lat... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 205,166 |
2410.00485 | A Hitchhikers Guide to Fine-Grained Face Forgery Detection Using Common
Sense Reasoning | Explainability in artificial intelligence is crucial for restoring trust, particularly in areas like face forgery detection, where viewers often struggle to distinguish between real and fabricated content. Vision and Large Language Models (VLLM) bridge computer vision and natural language, offering numerous application... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 493,400 |
1702.08089 | Quantum parameter estimation via dispersive measurement in circuit QED | We investigate the quantum parameter estimation in circuit quantum electrodynamics via dispersive measurement. Based on the Metropolis Hastings (MH) algorithm and the Markov chain Monte Carlo (MCMC) integration, a new algorithm is proposed to calculate the Fisher information by the stochastic master equation for unknow... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 68,913 |
2207.11652 | Counterfactual Reasoning for Out-of-distribution Multimodal Sentiment
Analysis | Existing studies on multimodal sentiment analysis heavily rely on textual modality and unavoidably induce the spurious correlations between textual words and sentiment labels. This greatly hinders the model generalization ability. To address this problem, we define the task of out-of-distribution (OOD) multimodal senti... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 309,721 |
1809.02479 | Convolutional Neural Network: Text Classification Model for Open Domain
Question Answering System | Recently machine learning is being applied to almost every data domain one of which is Question Answering Systems (QAS). A typical Question Answering System is fairly an information retrieval system, which matches documents or text and retrieve the most accurate one. The idea of open domain question answering system pu... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 107,058 |
1607.00973 | A fast marching algorithm for the factored eikonal equation | The eikonal equation is instrumental in many applications in several fields ranging from computer vision to geoscience. This equation can be efficiently solved using the iterative Fast Sweeping (FS) methods and the direct Fast Marching (FM) methods. However, when used for a point source, the original eikonal equation i... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 58,162 |
1809.10438 | Wafer Quality Inspection using Memristive LSTM, ANN, DNN and HTM | The automated wafer inspection and quality control is a complex and time-consuming task, which can speed up using neuromorphic memristive architectures, as a separate inspection device or integrating directly into sensors. This paper presents the performance analysis and comparison of different neuromorphic architectur... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 108,911 |
2007.06159 | Implicit Distributional Reinforcement Learning | To improve the sample efficiency of policy-gradient based reinforcement learning algorithms, we propose implicit distributional actor-critic (IDAC) that consists of a distributional critic, built on two deep generator networks (DGNs), and a semi-implicit actor (SIA), powered by a flexible policy distribution. We adopt ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 186,920 |
2301.13362 | Optimizing DDPM Sampling with Shortcut Fine-Tuning | In this study, we propose Shortcut Fine-Tuning (SFT), a new approach for addressing the challenge of fast sampling of pretrained Denoising Diffusion Probabilistic Models (DDPMs). SFT advocates for the fine-tuning of DDPM samplers through the direct minimization of Integral Probability Metrics (IPM), instead of learning... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 342,876 |
1301.3850 | A Two-round Variant of EM for Gaussian Mixtures | Given a set of possible models (e.g., Bayesian network structures) and a data sample, in the unsupervised model selection problem the task is to choose the most accurate model with respect to the domain joint probability distribution. In contrast to this, in supervised model selection it is a priori known that the chos... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 21,162 |
1807.04897 | TS2C: Tight Box Mining with Surrounding Segmentation Context for Weakly
Supervised Object Detection | This work provides a simple approach to discover tight object bounding boxes with only image-level supervision, called Tight box mining with Surrounding Segmentation Context (TS2C). We observe that object candidates mined through current multiple instance learning methods are usually trapped to discriminative object pa... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 102,824 |
1904.06830 | ContactDB: Analyzing and Predicting Grasp Contact via Thermal Imaging | Grasping and manipulating objects is an important human skill. Since hand-object contact is fundamental to grasping, capturing it can lead to important insights. However, observing contact through external sensors is challenging because of occlusion and the complexity of the human hand. We present ContactDB, a novel da... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 127,645 |
2402.16240 | High-Frequency-aware Hierarchical Contrastive Selective Coding for
Representation Learning on Text-attributed Graphs | We investigate node representation learning on text-attributed graphs (TAGs), where nodes are associated with text information. Although recent studies on graph neural networks (GNNs) and pretrained language models (PLMs) have exhibited their power in encoding network and text signals, respectively, less attention has ... | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 432,478 |
1803.05084 | Local Partition in Rich Graphs | Local graph partitioning is a key graph mining tool that allows researchers to identify small groups of interrelated nodes (e.g. people) and their connective edges (e.g. interactions). Because local graph partitioning is primarily focused on the network structure of the graph (vertices and edges), it often fails to con... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 92,569 |
1808.06818 | A Usefulness-based Approach for Measuring the Local and Global Effect of
IIR Services | In Interactive Information Retrieval (IIR) different services such as search term suggestion can support users in their search process. The applicability and performance of such services is either measured with different user-centered studies (like usability tests or laboratory experiments) or, in the context of IR, wi... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 105,616 |
2403.00261 | Spatial Cascaded Clustering and Weighted Memory for Unsupervised Person
Re-identification | Recent unsupervised person re-identification (re-ID) methods achieve high performance by leveraging fine-grained local context. These methods are referred to as part-based methods. However, most part-based methods obtain local contexts through horizontal division, which suffer from misalignment due to various human pos... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 433,919 |
1607.07423 | A Non-Parametric Control Chart For High Frequency Multivariate Data | Support Vector Data Description (SVDD) is a machine learning technique used for single class classification and outlier detection. SVDD based K-chart was first introduced by Sun and Tsung for monitoring multivariate processes when underlying distribution of process parameters or quality characteristics depart from Norm... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 59,018 |
2010.10932 | Deep learning-based citation recommendation system for patents | In this study, we address the challenges in developing a deep learning-based automatic patent citation recommendation system. Although deep learning-based recommendation systems have exhibited outstanding performance in various domains (such as movies, products, and paper citations), their validity in patent citations ... | false | false | false | false | true | true | false | false | true | false | false | false | false | false | false | false | false | false | 202,059 |
2210.08266 | MenuAI: Restaurant Food Recommendation System via a Transformer-based
Deep Learning Model | Food recommendation system has proven as an effective technology to provide guidance on dietary choices, and this is especially important for patients suffering from chronic diseases. Unlike other multimedia recommendations, such as books and movies, food recommendation task is highly relied on the context at the momen... | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | 324,067 |
2412.20977 | UnrealZoo: Enriching Photo-realistic Virtual Worlds for Embodied AI | We introduce UnrealZoo, a rich collection of photo-realistic 3D virtual worlds built on Unreal Engine, designed to reflect the complexity and variability of the open worlds. Additionally, we offer a variety of playable entities for embodied AI agents. Based on UnrealCV, we provide a suite of easy-to-use Python APIs and... | false | false | false | false | true | false | false | true | false | false | false | true | false | false | false | false | false | false | 521,418 |
2407.03152 | Stereo Risk: A Continuous Modeling Approach to Stereo Matching | We introduce Stereo Risk, a new deep-learning approach to solve the classical stereo-matching problem in computer vision. As it is well-known that stereo matching boils down to a per-pixel disparity estimation problem, the popular state-of-the-art stereo-matching approaches widely rely on regressing the scene disparity... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 470,044 |
2409.02070 | Explicit Differentiable Slicing and Global Deformation for Cardiac Mesh
Reconstruction | Mesh reconstruction of the cardiac anatomy from medical images is useful for shape and motion measurements and biophysics simulations to facilitate the assessment of cardiac function and health. However, 3D medical images are often acquired as 2D slices that are sparsely sampled and noisy, and mesh reconstruction on su... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 485,562 |
2312.15599 | Preliminary Study on Incremental Learning for Large Language Model-based
Recommender Systems | Adapting Large Language Models for Recommendation (LLM4Rec) has shown promising results. However, the challenges of deploying LLM4Rec in real-world scenarios remain largely unexplored. In particular, recommender models need incremental adaptation to evolving user preferences, while the suitability of traditional increm... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 418,060 |
2010.05673 | Is Plug-in Solver Sample-Efficient for Feature-based Reinforcement
Learning? | It is believed that a model-based approach for reinforcement learning (RL) is the key to reduce sample complexity. However, the understanding of the sample optimality of model-based RL is still largely missing, even for the linear case. This work considers sample complexity of finding an $\epsilon$-optimal policy in a ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 200,220 |
2308.15932 | Attention-based CT Scan Interpolation for Lesion Segmentation of
Colorectal Liver Metastases | Small liver lesions common to colorectal liver metastases (CRLMs) are challenging for convolutional neural network (CNN) segmentation models, especially when we have a wide range of slice thicknesses in the computed tomography (CT) scans. Slice thickness of CT images may vary by clinical indication. For example, thinne... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 388,852 |
2006.15998 | Distortion based Light-weight Security for Cyber-Physical Systems | In Cyber-Physical Systems (CPS), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries. This calls for efficient mechanisms for secure transmission of data since control systems are becoming increasingly distributed over larger g... | false | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | 184,685 |
2301.06986 | Structural Analysis by Modified Signature Matrix for
Integro-differential-algebraic Equations | Integro-differential-algebraic equations (IDAE)s are widely used in applications of engineering and analysis. When there are hidden constraints in an IDAE, structural analysis is necessary. But if derivatives of dependent variables appear in their integrals, the existing definition of the signature matrix for an IDAE c... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 340,799 |
1809.04972 | Simulation-based Distributed Coordination Maximization over Networks | In various online/offline multi-agent networked environments, it is very popular that the system can benefit from coordinating actions of two interacting agents at some cost of coordination. In this paper, we first formulate an optimization problem that captures the amount of coordination gain at the cost of node activ... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | true | 107,687 |
2108.08497 | Monarch: A Durable Polymorphic Memory For Data Intensive Applications | 3D die stacking has often been proposed to build large-scale DRAM-based caches. Unfortunately, the power and performance overheads of DRAM limit the efficiency of high-bandwidth memories. Also, DRAM is facing serious scalability challenges that make alternative technologies more appealing. This paper examines Monarch, ... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | true | 251,274 |
1904.01775 | Multimodal Representation Learning using Deep Multiset Canonical
Correlation | We propose Deep Multiset Canonical Correlation Analysis (dMCCA) as an extension to representation learning using CCA when the underlying signal is observed across multiple (more than two) modalities. We use deep learning framework to learn non-linear transformations from different modalities to a shared subspace such t... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 126,245 |
1905.09383 | An Optimal Private Stochastic-MAB Algorithm Based on an Optimal Private
Stopping Rule | We present a provably optimal differentially private algorithm for the stochastic multi-arm bandit problem, as opposed to the private analogue of the UCB-algorithm [Mishra and Thakurta, 2015; Tossou and Dimitrakakis, 2016] which doesn't meet the recently discovered lower-bound of $\Omega \left(\frac{K\log(T)}{\epsilon}... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 131,716 |
2412.20960 | Rise of Generative Artificial Intelligence in Science | Generative Artificial Intelligence (GenAI, generative AI) has rapidly become available as a tool in scientific research. To explore the use of generative AI in science, we conduct an empirical analysis using OpenAlex. Analyzing GenAI publications and other AI publications from 2017 to 2023, we profile growth patterns, ... | false | false | false | false | true | true | false | false | false | false | false | false | false | true | false | false | false | false | 521,412 |
2403.13825 | Deep Generative Models for Ultra-High Granularity Particle Physics
Detector Simulation: A Voyage From Emulation to Extrapolation | Simulating ultra-high-granularity detector responses in Particle Physics represents a critical yet computationally demanding task. This thesis aims to overcome this challenge for the Pixel Vertex Detector (PXD) at the Belle II experiment, which features over 7.5M pixel channels-the highest spatial resolution detector s... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 439,798 |
1806.09689 | Convex LMI optimization for the uncertain power flow analysis | This paper investigates the uncertain power flow analysis in distribution networks within the context of renewable power resources integration such as wind and solar power. The analysis aims to bound the worst-case voltage magnitude in any node of the network for a given uncertain power generation scenario. The major d... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 101,395 |
1905.10045 | Curriculum Loss: Robust Learning and Generalization against Label
Corruption | Deep neural networks (DNNs) have great expressive power, which can even memorize samples with wrong labels. It is vitally important to reiterate robustness and generalization in DNNs against label corruption. To this end, this paper studies the 0-1 loss, which has a monotonic relationship with an empirical adversary (r... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 131,933 |
1605.00855 | Improving Image Captioning by Concept-based Sentence Reranking | This paper describes our winning entry in the ImageCLEF 2015 image sentence generation task. We improve Google's CNN-LSTM model by introducing concept-based sentence reranking, a data-driven approach which exploits the large amounts of concept-level annotations on Flickr. Different from previous usage of concept detect... | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | 55,397 |
2406.19531 | Off-policy Evaluation with Deeply-abstracted States | Off-policy evaluation (OPE) is crucial for assessing a target policy's impact offline before its deployment. However, achieving accurate OPE in large state spaces remains challenging. This paper studies state abstractions -- originally designed for policy learning -- in the context of OPE. Our contributions are three-f... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 468,450 |
2011.12683 | GraphHINGE: Learning Interaction Models of Structured Neighborhood on
Heterogeneous Information Network | Heterogeneous information network (HIN) has been widely used to characterize entities of various types and their complex relations. Recent attempts either rely on explicit path reachability to leverage path-based semantic relatedness or graph neighborhood to learn heterogeneous network representations before prediction... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 208,237 |
2302.05098 | Confidence-based Reliable Learning under Dual Noises | Deep neural networks (DNNs) have achieved remarkable success in a variety of computer vision tasks, where massive labeled images are routinely required for model optimization. Yet, the data collected from the open world are unavoidably polluted by noise, which may significantly undermine the efficacy of the learned mod... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 344,933 |
2007.04649 | Learning to Reweight with Deep Interactions | Recently, the concept of teaching has been introduced into machine learning, in which a teacher model is used to guide the training of a student model (which will be used in real tasks) through data selection, loss function design, etc. Learning to reweight, which is a specific kind of teaching that reweights training ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 186,431 |
2403.01747 | Towards Self-Contained Answers: Entity-Based Answer Rewriting in
Conversational Search | Conversational information-seeking (CIS) is an emerging paradigm for knowledge acquisition and exploratory search. Traditional web search interfaces enable easy exploration of entities, but this is limited in conversational settings due to the limited-bandwidth interface. This paper explore ways to rewrite answers in C... | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | 434,554 |
2409.09143 | DomURLs_BERT: Pre-trained BERT-based Model for Malicious Domains and
URLs Detection and Classification | Detecting and classifying suspicious or malicious domain names and URLs is fundamental task in cybersecurity. To leverage such indicators of compromise, cybersecurity vendors and practitioners often maintain and update blacklists of known malicious domains and URLs. However, blacklists frequently fail to identify emerg... | false | false | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | 488,194 |
1004.3071 | Subspace Methods for Joint Sparse Recovery | We propose robust and efficient algorithms for the joint sparse recovery problem in compressed sensing, which simultaneously recover the supports of jointly sparse signals from their multiple measurement vectors obtained through a common sensing matrix. In a favorable situation, the unknown matrix, which consists of th... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 6,194 |
2305.00567 | Scaling Pareto-Efficient Decision Making Via Offline Multi-Objective RL | The goal of multi-objective reinforcement learning (MORL) is to learn policies that simultaneously optimize multiple competing objectives. In practice, an agent's preferences over the objectives may not be known apriori, and hence, we require policies that can generalize to arbitrary preferences at test time. In this w... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 361,379 |
2306.03055 | Analyzing Syntactic Generalization Capacity of Pre-trained Language
Models on Japanese Honorific Conversion | Using Japanese honorifics is challenging because it requires not only knowledge of the grammatical rules but also contextual information, such as social relationships. It remains unclear whether pre-trained large language models (LLMs) can flexibly handle Japanese honorifics like humans. To analyze this, we introduce a... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 371,173 |
2011.02506 | The dynamic effect of mechanical losses of actuators on the equations of
motion of legged robots | Industrial manipulators do not collapse under their own weight when powered off due to the friction in their joints. Although these mechanism are effective for stiff position control of pick-and-place, they are inappropriate for legged robots which must rapidly regulate compliant interactions with the environment. Howe... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 204,936 |
1203.3482 | Formula-Based Probabilistic Inference | Computing the probability of a formula given the probabilities or weights associated with other formulas is a natural extension of logical inference to the probabilistic setting. Surprisingly, this problem has received little attention in the literature to date, particularly considering that it includes many standard i... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 14,930 |
2111.11398 | Why Do Self-Supervised Models Transfer? Investigating the Impact of
Invariance on Downstream Tasks | Self-supervised learning is a powerful paradigm for representation learning on unlabelled images. A wealth of effective new methods based on instance matching rely on data-augmentation to drive learning, and these have reached a rough agreement on an augmentation scheme that optimises popular recognition benchmarks. Ho... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 267,653 |
2311.13356 | Uncertainty Estimation in Multi-Agent Distributed Learning | Traditionally, IoT edge devices have been perceived primarily as low-power components with limited capabilities for autonomous operations. Yet, with emerging advancements in embedded AI hardware design, a foundational shift paves the way for future possibilities. Thus, the aim of the KDT NEUROKIT2E project is to establ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 409,715 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.